Connect with us

Hi, what are you looking for?

HEADLINES

Pandemic, post-pandemic measures will continue to alter threat landscape

The retail and hospitality industry with its predominant “brick-and-mortar” focus pre-pandemic, bore the brunt of moving portions of their workforce to remote work – complicating their attack surfaces and creating opportunities for attackers.

Image by Megan Rexazin from Pixabay.com

IntSights, the threat intelligence company focused on enabling enterprises to Defend Forward, released a research report on their findings of the cyber threat impact of COVID-19 on the retail and hospitality industry. The retail and hospitality industry with its predominant “brick-and-mortar” focus pre-pandemic, bore the brunt of moving portions of their workforce to remote work – complicating their attack surfaces and creating opportunities for attackers.

The report uncovers how the pandemic and post-pandemic measures will continue to alter the industry threat landscape, especially as vaccine distribution and contact tracing efforts expand to wider segments of the population.

Retail, hospitality, and travel businesses increasingly hold protected health information (PHI) and personally identifiable information (PII) records as more and more of these businesses now require proof of COVID-19 testing or vaccination from customers or employees. IntSights discovered that underground black market sale prices of containing PHI and PII with key data points for identity theft are notably higher than those of even compromised credit cards, putting the industry at a larger risk of cyberattacks as the information it holds becomes increasingly attractive and lucrative to criminals.

The report also highlights the surge in demand for fake COVID-19 testing and vaccination documents resulting in attacks against retailers with pharmacy components – and a black market for fake test results has been thriving online. Some criminal vendors claim that they can abuse access to legitimate infrastructure that outputs testing documentation to generate otherwise authentic documents without actually conducting tests.

Advertisement. Scroll to continue reading.

Other key findings include:

  • Growth in the sale of unauthorized access to enterprise networks on underground criminal forums that enable other criminals to deploy ransomware on the networks, for instance, and access are mostly priced at four figures in USD
  • Expansion of ecommerce attacks and card-not-present (CNP) fraud as more consumers increase reliance on ecommerce and home deliveries
    • Up for sale on underground criminal forums are Python scripts to bypass one-time passwords (OTPs) which provide an extra layer of protection for CNP transactions

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

White Papers

n the Philippines, industry players are taking a more proactive approach to building a security framework for digital resilience.

HEADLINES

This marks the company’s first participation in the region’s premier tech event, where it will showcase its groundbreaking cybersecurity solutions to industry leaders, innovators,...

HEADLINES

A report found that the primary way attackers gained initial access to networks (56% of all cases across MDR and IR) was by exploiting...

White Papers

The Department of Information and Communications Technology (DICT) reports that government agencies, academic institutions, and telecommunications companies remain prime targets for cyber criminals, with...

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

Advertisement